For example, when designing an Encrypted instant messaging network, a network engineer without the capacity to crack Encryption codes can be an Observer when messages are transmitted, even if he could not read them.

Information Leakage typically leads to the ability to Predict some outcome to a relative high degree and create some an Exploit of the Protocol or the Encryption.